[PDF] Top 20 Towards faster, secure and more energy efficient optical networks
Has 10000 "Towards faster, secure and more energy efficient optical networks" found on our website. Below are the top 20 most common "Towards faster, secure and more energy efficient optical networks".
Towards faster, secure and more energy efficient optical networks
... 14:00 14:20 Direct acousto-optical analysis of ultra-high frequency radio-signals based on the collinear wave heterodyning in a medium with dispersive losses (OPTO-25-4-2) Alexandre S. Shcher- bakov, Abraham Luna ... See full document
33
A Study on Networks and Comparison of Wired, Wireless and Optical Networks
... Computer Networks provide a secure and faster means of connectivity but the need of mobility ...users towards wireless ...through networks at very high rates of ...of networks ... See full document
9
Energy-Efficient Secure Key Distribution System in Hierarchical Wireless Sensor Networks
... an energy-efficient secure method against power exhausting attacks, particularly the denial-of-sleep attacks, which can cut down the lifetime of WSNs ... See full document
8
Title: Secure and Efficient Energy-Aware Secure Routing (EASER) Protocol for Wireless Sensor Networks
... a secure and efficient Cost-Aware Routing (CASER) protocol that can address both energy balance and routing security concurrently in ...the energy levels of its immediate adjacent neighboring ... See full document
6
Energy Efficient IoT Virtualization Framework with Passive Optical Access Networks
... the energy efficiency is one of the most important challenges that should be tackled by IoT networks architects ...the energy efficiency challenge in networks and data centres is cloud ... See full document
5
Energy Efficient MAC Protocol for Directional...
... Sensor networks have consistently relied on Radio Frequency (RF) to provide connectivity between various sensor nodes and Cluster Head ...Space Optical (FSO) communication within the wireless sensor ... See full document
6
Energy efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks
... sensor networks (MWSNs) are a relatively new type of WSN where the sensor nodes are ...an energy-efficient and secure mobile node reauthentication scheme (ESMR) for MWSNs that satisfies the ... See full document
16
Secure Energy Efficient Data Transmission over WSNs
... sensor networks that uses a distributed cluster formation based on affinity propagation ...Low energy adaptive clustering hierarchy-Affinity Propagation protocol (LEACH-AP) enable a fully distributed ... See full document
5
Energy aware routing in optical grid networks
... the energy consumption of Information and communication technology (ICT) equipment is also increasing ...the energy consumption. In this thesis we proposed a new energy efficient routing ap- ... See full document
67
Energy Efficient Secure Computation Offloading in NOMA based mMTC Networks for IoT
... and energy consumption in computation offloading with limited resources ...an energy-efficient offloading-decision algorithm to balance the energy-delay tradeoff based on the criteria of ... See full document
17
A Review On Energy Efficient Secure Routing For Data Aggregation In Wireless Sensor Networks
... have more computational and communication power comparatively other sensors ...In secure route, sensor data, which is identified as non-redundant by the gateways, is transmitted to the Sink in encrypted ... See full document
5
AN EFFICIENT ENERGY BALANCE AND SECURE DATA AGGREGATION IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
... The more modern networks are bi-directional, also enabling control of sensor ...sensor networks was motivated by military applications such as battlefield surveillance; today such networks are ... See full document
13
Energy efficient and secure wireless communications for wireless sensor networks
... saves energy by identifying nodes that are equivalent from a routing perspective and then shutting down unnecessary nodes, keeping a constant level of routing ...substantial energy, and allowing network ... See full document
130
Energy efficient and secure routing technique for wireless sensor networks
... at secure routing for WSNs, TARF effectively protects WSNs from severe attacks through replaying routing information; it requires neither tight time synchronization nor known geographic ...producing secure ... See full document
6
A HYBRID METHOD OF LINGUISTIC APPROACH AND STATISTICAL METHOD FOR NESTED NOUN COMPOUND EXTRACTION
... and energy conservation in ...and energy saving status. So the efficient secure multicast route can be chosen to improve the network ... See full document
8
A Review on Energy Efficient Routing Protocols in Wireless Sensor Networks
... researchers more these days due to their accepted applications in environment monitoring, radiation and nuclear-threat recognition structure, weapon sensors for ships, battlefield investigation and observation, ... See full document
5
Research on network coding aware energy efficient routing for wireless sensor networks
... sensor networks, which gives another way to improve energy efficiency of wire- less sensor ...of energy saving. (3) Al- though NAER improves the energy efficiency of WSNs, the extra coding ... See full document
31
A Trustworthy and Energy-Aware Routing Protocol in Software-Defined Wireless Mesh Networks
... Lei Liu an associate professor in Shandong University, China. He has published over 30 papers in conference proceedings and journals. He has served as program committee for more than 20 international conferences, ... See full document
26
More Efficient Secure Outsourcing Methods for Bilinear Maps
... In this paper, we propose two efficient new algorithms for secure outsourcing of bilinear maps. Compared to the state of the art algorithms (especially Tian et al.’s [20]), our algorithms need less offline ... See full document
15
Towards Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks
... consumed energy and achiev- able ...consumed energy and achievable performance of decision FRs depend on various factors, such as the number of cognitive users, the frame length, and the ... See full document
310
Related subjects